TERNET IN-Country Cybersecurity, Trust and Identity Workshop (Face-to-Face)

Africa/Blantyre
Dar es Salaam, Tanzania

Dar es Salaam, Tanzania

    • Day 1
      1. Threat Universe & Landscape
      2. Organizations cyber risk profiling
        o Cyber kill chain
      3. Regulatory Universe
      4. Maturity Assessment (CMMI)
      5. Cybersecurity Reference Architecture
      6. Cybersecurity governance model (strategy 2 execution)
      7. Change management #1 round-table (prioritized milestone roadmap)
    • Day 2
      1. A 100000km view of the cloud
      2. Cloud governance model
      3. Cloud risk assessment
        o Threat Modelling, risks, vulnerabilities
      4. Cloud computing & security
      5. Identity & access governance
        o Joiner, mover, leaver,
        o Provisioning & de-provisioning
        o Platforms (Azure AD, applications, roles, groups etc.)
        o AAA - Segregation of duty controls
      6. Roadmap to zero trust
      7. Change management #2 round table - cloud risk assessment
    • Day 3
      1. Zero trust governance framework
        a. Identity and Access Management (IAM)
        b. Device and User Authentication
        c. Network Segmentation
        d. Network Visibility and Monitoring
        e. Least Privilege Access
        f. Continuous Authentication and Authorization
        g. Policy Enforcement and Access Control
        h. Threat Intelligence and Analytics
        i. Change Management #5 Round table - Reflection & forging forward